Movatterモバイル変換


[0]ホーム

URL:


US12327242B2 - Multi-signature verification network - Google Patents

Multi-signature verification network
Download PDF

Info

Publication number
US12327242B2
US12327242B2US18/829,661US202418829661AUS12327242B2US 12327242 B2US12327242 B2US 12327242B2US 202418829661 AUS202418829661 AUS 202418829661AUS 12327242 B2US12327242 B2US 12327242B2
Authority
US
United States
Prior art keywords
verification
transaction
blockchain transaction
network
proposed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US18/829,661
Other versions
US20240428234A1 (en
Inventor
Jerry Perullo
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intercontinental Exchange Holdings Inc
Original Assignee
Intercontinental Exchange Holdings Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intercontinental Exchange Holdings IncfiledCriticalIntercontinental Exchange Holdings Inc
Priority to US18/829,661priorityCriticalpatent/US12327242B2/en
Assigned to INTERCONTINENTAL EXCHANGE HOLDINGS, INC.reassignmentINTERCONTINENTAL EXCHANGE HOLDINGS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: PERULLO, JERRY
Publication of US20240428234A1publicationCriticalpatent/US20240428234A1/en
Priority to US19/199,644prioritypatent/US20250265580A1/en
Application grantedgrantedCritical
Publication of US12327242B2publicationCriticalpatent/US12327242B2/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Systems and methods for authorizing a blockchain transaction. A verification network receives a transaction request for the blockchain transaction from a payer device including a first signature generated by a first private key associated with a payer. The verification network broadcasts a verification request to verification system(s) which assess pre-agreed threshold parameters. If the parameter(s) are satisfied, at least one verification system perfects the transaction by generating a second signature using a second private key, and broadcasts the transaction to the blockchain network. If the parameter(s) are not satisfied, verification offer(s) from among the verification system(s) including the second signature(s) are used to prompt the payer device to confirm the blockchain transaction by selecting at least one of the offer(s). The verification network receives selected offer(s) from the payer device and broadcasts the transaction to the blockchain network, in accordance with the selected offer(s) and the transaction request.

Description

FIELD OF THE DISCLOSURE
The present disclosure generally relates to systems and methods for authorizing blockchain-based transactions of digital assets, and more specifically, to a multi-signature authorization system including a multi-signature verification network that leverages a pool of trusted verification institutions to generate at least one signature and at least one verification offer together with a payer signature, in order to authorize blockchain-based transactions.
BACKGROUND
The use of blockchain technology for transactions involving digital assets such as cryptocurrencies has become increasingly popular due to the decentralized nature of transactions, the use of a mathematically verifiable ledger, near-immediate settlement, and isolation from operational, technical, or geo-political concentration risks. Although blockchain technology presents these advantages, managing cryptographic keys is burdensome and dangerous, exposing users to the dual threats of electronic theft and accidental loss of assets. Further, with near-immediate settlement comes a lack of “claw-back” reversibility of transactions, increasing the impact of fraud. Accordingly, there is a need to provide the security, safety, and reversibility of traditional centralized payment systems without reinstating concentration risks posed by relying on any single service provider.
SUMMARY
Aspects of the present disclosure relate to systems, methods and non-transitory computer readable media for authorizing a blockchain transaction. In some examples, system may include a verification network in communication with at least a payer computing device associated with a payer, a verification pool that includes one or more independent third-party verification computing systems (e.g., verification providers or verification institutions), and a blockchain network. In some examples, the verification network includes a computing system having a processor and a memory having programming instructions stored thereon, where the programming instructions, when executed by the processor, cause the system to perform an operation for authorizing the blockchain transaction. The operation of the verification network includes receiving, from the payer computing device, a partially-signed blockchain transaction (e.g., a transaction request). The transaction may include a first signature, where the first signature may be generated by a first private key created and managed by the payer (e.g., a first private key associated with the payer). In one example, the first signature may be the only signature included in the (partially-signed) transaction. In some examples, the partially-signed transaction may be enriched by the verification network with situational details such as (without being limited to) time, value, geolocation, merchant statistics and/or any suitable information that may be useful to a verification provider in analyzing the likelihood of attempted fraud. Since, in an exemplary embodiment, the payer private key must be protected by the payer, the nature of the present disclosure significantly mitigates the impact of unauthorized access to this payer private key, thereby significantly increasing the attractiveness of existing backup solutions.
The operation of the verification network further includes broadcasting the partially-signed transaction and details relating to one or more pre-agreed threshold parameters (e.g., risk assessment details) to the one or more verification providers. The operation may further include assessing, by at least one verification provider from among the verification pool, the one or more pre-agreed threshold parameters associated with the partially-signed transaction. The assessing may be a part of a broader risk analysis procedure and the threshold parameters may comprise one or more pre-agreed risk parameters. If the pre-agreed threshold parameters are satisfied, the (at least one) verification provider may immediately perfect (e.g., “bless”) the transaction request and broadcast the now-perfected blockchain transaction to the blockchain network. Perfecting the transaction request may include generating a second signature using a second private key (e.g., created and maintained by the verification provider) and optionally imposing a pre-agreed surcharge.
In the absence of pre-agreed threshold parameters, or if the pre-agreed threshold parameters are not satisfied during the assessment, the operation may further include generating, by at least one of the one or more verification providers, one or more verification offers including a respective one or more second signatures and, optionally, in some examples, one or more risk-related surcharges. Each of the one or more second signatures may be generated by a respective one of the one or more verification providers using a second private key (e.g., created and maintained by the verification provider). In some embodiments, the one or more verification providers may transmit one or more denials, rather than verification offers.
In an example operation of the present disclosure, the first verification provider to assess the risk and perfect the transaction may prevail and capture a previously-agreed fee. In the event that the risk analysis performed by the verification provider determines that a risk surcharge is needed to offset risk, the operation may include transmitting the one or more verification offers to the payer client device and prompting the payer computing device to confirm the blockchain transaction by selecting at least one of the one or more verification offers and receiving, from the payer client device, a selection of at least one offer of the one or more verification offers (thereby providing a perfected blockchain transaction). The operation may conclude with broadcasting the perfected blockchain transaction to the blockchain network.
In some examples, systems and methods of the present disclosure may leverage the breakthroughs in real-time risk assessment that have been created via high-frequency trading to allow verification providers to compete for individual transaction fees, while isolating the payer from reliance on any single provider.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG.1A is a block diagram illustrating a computing environment for authorizing blockchain transactions, according to an exemplary embodiment.
FIG.1B is a block diagram visually depicting one or more parties to a blockchain transaction, according to an exemplary embodiment.
FIG.2 is a block diagram illustrating a computing environment for authorizing blockchain transactions including a verification network, according to an exemplary embodiment.
FIG.3 is a flow diagram illustrating a method of authorizing a blockchain transaction using a verification network, according to one or more exemplary embodiments.
FIG.4 is a flow diagram illustrating communication among one or more computing components for authorizing a blockchain transaction using a verification network, according to one or more exemplary embodiments.
FIG.5A is a block diagram illustrating one or more screenshots of a client computing device, according to one or more exemplary embodiments.
FIG.5B is a block diagram illustrating one or more screenshots of a client computing device, according to one or more exemplary embodiments.
FIG.6 is a block diagram illustrating a computing environment, according to one or more exemplary embodiments.
DETAILED DESCRIPTION
Aspects of the present disclosure relate to systems, methods and non-transitory computer readable media for authorizing a blockchain transaction. In some examples, system may include a verification network in communication with at least a payer computing device associated with a payer, a verification pool that includes one or more independent third-party verification computing systems (e.g., verification providers or verification institutions), and a blockchain network. In some examples, the verification network includes a computing system having a processor and a memory having programming instructions stored thereon, where the programming instructions, when executed by the processor, cause the system to perform an operation for authorizing the blockchain transaction. The operation includes receiving, from the payer computing device, a partially-signed blockchain transaction (e.g., a transaction request). The transaction may include a first signature, where the first signature may be generated by a first private key created and managed by the payer (e.g., a first private key associated with the payer). In one example, the first signature may be the only signature included in the (partially-signed) transaction. In some examples, the partially-signed transaction may be enriched by the verification network with situational details such as (without being limited to) time, value, geolocation, merchant statistics and/or any suitable information that may be useful to a verification provider in analyzing the likelihood of attempted fraud. Since, in an exemplary embodiment of the present disclosure, the payer private key must be protected by the payer, the nature of the present disclosure significantly mitigates the impact of unauthorized access to this payer private key, thereby significantly increasing the attractiveness of existing backup solutions.
The operation of the verification network further includes broadcasting the partially-signed transaction and details relating to one or more pre-agreed threshold parameters (e.g., risk assessment details) to the one or more verification providers. The operation may further include assessing, by at least one verification provider from among the verification pool, the one or more pre-agreed threshold parameters associated with the partially-signed transaction. The assessing may be a part of a broader risk analysis procedure and the threshold parameters may comprise one or more pre-agreed risk parameters. If the pre-agreed threshold parameters are satisfied, the (at least one) verification provider may immediately perfect (e.g., “bless”) the transaction request and broadcast the now-perfected blockchain transaction to the blockchain network. Perfecting the transaction request may include generating a second signature using a second private key (e.g., created and maintained by the verification provider) and optionally imposing a pre-agreed surcharge.
In the absence of pre-agreed threshold parameters, or if the pre-agreed threshold parameters are not satisfied during the assessment, the operation may further include generating, by at least one of the one or more verification providers, one or more verification offers including a respective one or more second signatures and, optionally, in some examples, one or more risk-related surcharges. Each of the one or more second signatures may be generated by a respective one of the one or more verification providers using a second private key (e.g., created and maintained by the verification provider). In some embodiments, the one or more verification providers may transmit one or more denials, rather than verification offers.
In an example operation of the present disclosure, the first verification provider to assess the risk and perfect the transaction may prevail and capture a previously-agreed fec. In the event that the risk analysis performed by the verification provider determines that a risk surcharge is needed to offset risk, the operation may include transmitting the one or more verification offers to the payer client device and prompting the payer computing device to confirm the blockchain transaction by selecting at least one of the one or more verification offers and receiving, from the payer client device, a selection of at least one offer of the one or more verification offers (thereby providing a perfected blockchain transaction). The operation may conclude with broadcasting the perfected blockchain transaction to the blockchain network.
In some examples, systems and methods of the present disclosure may leverage the breakthroughs in real-time risk assessment that have been created via high-frequency trading to allow verification providers to compete for individual transaction fees, while isolating the payer from reliance on any single provider.
In conventional blockchain transaction systems, two parties may directly transact with one another. For example, a payee may share a public address (e.g., public key) to which a payer is to transmit an amount of cryptocurrency. The payer may then initiate a transaction that has one or more inputs and one or more outputs. The one or more inputs may correspond to a public key of the payer (e.g., an address from which the cryptocurrency originates) and a signature that was generated using a private key of the payer. The one or more outputs may correspond to the public address of the payee. The transaction may be transmitted to a blockchain network for verification (e.g., to verify that the payer actually has the amount of digital assets, e.g., cryptocurrency, that the payer alleges to have, and that the payer has not transmitted these digital assets).
Such conventional systems, however, suffer from one or more limitations. For example, should a user's private key become compromised (e.g., stolen), the fraudulent party that obtained the user's private key has necessarily stolen all cryptocurrency associated therewith. Further, should a user lose their private key, all cryptocurrency associated therewith is effectively lost.
One or more systems currently exist to combat the limitations of a single signature transaction. For example, one or more systems may provide a multi-signature service. A multi-signature transaction requires that two or more signatures be generated for each transaction. With conventional multi-signature systems, each system functions to provide the additional signature that may be necessary to perfect a transaction. In other words, in a conventional multi-signature service, a signature from the payer and a signature from the multi-signature service is needed for any given transaction.
The one or more techniques disclosed herein provide a verification network that improves upon conventional multi-signature services. For example, the verification network described herein acts as a middleman between parties to a transaction and one or more trusted verification institutions. Upon receiving a transaction request from a payer, the verification network may broadcast a verification request to a pool of pre-defined verification institutions. Each verification institution may be a trusted entity that can “bless” or verify the transaction. At least one signature is needed from the pool of verification institutions to perfect (i.e., “bless”) the respective transaction. Accordingly, the system of the present disclosure eliminates dependency on a single entity, as currently required by conventional multi-signature services, and instead relies on a pool, or network, of verification institutions that may verify the transaction. Moreover, the system of the present disclosure also eliminates control over a payer's digital assets that may result from two or more parties colluding to release or take control of the digital assets.
The term “user” as used herein includes, for example, a person or entity that owns a computing device (which may include a wireless device); a person or entity that operates or utilizes a computing device; or a person or entity that is otherwise associated with a computing device (which may include a wireless device). It is contemplated that the term “user” is not intended to be limiting and may include various examples beyond those described.
Moreover, examples of the present disclosure described below refer to blockchain-based transactions involving digital assets such as, for example (but not limited to), cryptocurrency. In general, systems and methods of the present disclosure may be configured to authorize transactions involving any suitable digital asset that may be tokenized, including security tokens, tokenized real estate, and one or more cryptocurrencies (e.g., digital or virtual currency that may use cryptography for security). In general, cryptocurrency may include, without being limited to, Bitcoin, Litecoin, Ether, etc. In fact, for purposes of this disclosure, the term cryptocurrency should be understood to include any digital or virtual assert or currency.
In some examples, transactions with respect to the present disclosure are referred to as blockchain transactions. In other examples, transactions are referred to as cryptocurrency transactions. As used herein, both blockchain transactions and cryptocurrency transactions refer to transactions of cryptocurrency (or any suitable digital asset) that uses a blockchain network.
FIG.1A is a block diagram illustrating acomputing environment100 for authorizing blockchain transactions, according to an example embodiment.Computing environment100 may include atleast client device102,client device104,verification pool106,verification network105 andblockchain network108. Communication amongclient device102,client device104,verification pool106 andblockchain network108 may be performed viaverification network105. Although oneclient device102 and oneclient device104 are shown inFIG.1A, it is understood thatenvironment100 may include any number ofclient devices102 and/or any number ofclient devices104.
In the examples described herein,client device102 may be operated by a user representing a payer. For example,client device102 may be a mobile device, a tablet, a desktop computer, or any computing system having the capabilities described herein.
In the examples described herein,client device104 may be operated by a user representing a payee. For example,client device104 may be a mobile device, a tablet, a desktop computer, or any computing system having the capabilities described herein.
Client device102 andclient device104 may communicate withverification network105.Verification network105 may be representative of a service that supports multi-signature functionality. In general, multi-signature functionality is a service that requires two or more signatures (e.g., two or more private keys) to authorize a cryptocurrency transaction.Verification network105 may be configured to store one or more private keys associated with each user or subscriber. For example,verification network105 may be configured to store one or more private keys associated with at least the payer to a transaction (e.g., client device102).
Unlike conventional multi-signature services,verification network105 does not perform the verification of cryptocurrency transactions between parties to a transaction. Rather,verification network105 may be configured to facilitate the verification thereof by broadcasting a proposed transaction toverification pool106.
Verification pool106 may be representative of one or more trusted financial institutions (e.g., verification providers) that may verify a cryptocurrency transaction. In other words,verification pool106 may include one or more financial institutions that are required to act as a second party to a multi-signature transaction.Verification pool106 may include one ormore verification institutions1101,1102, . . . ,110n(generally “verification institution110”, where n is an integer greater than or equal to 1). In some embodiments, eachverification institution110 may be pre-approved withverification network105. When a transaction request is received fromclient device102 atverification network105,verification network105 may broadcast a verification request to eachverification institution110. Eachverification institution110 may then assess a risk associated with verifying the transaction. Based on this assessment, eachverification institution110 may generate a verification offer (described further below) to be transmitted toclient device102. In some embodiments, one ormore verification institutions110 may promptclient device102 to authenticate withverification institution110. For example, averification institution110 may requestverification network105 to transmit an identification request to the payer (e.g., client device102) to confirm the identity of the payer for risk analysis purposes. Because eachverification institution110 is competing with one or moreother verification institutions110, eachverification institution110 may race to assess the risk associated with a transaction and generate an offer that competes with other offers. Accordingly, those skilled in the art may readily understand thatverification institutions110 may balance the trade-off between quickly generating a verification offer and accurately assessing a risk associated with the verification offer.
When eachverification institution110 generates a verification offer,verification institution110 may access a private key associated with the payer (e.g., created and/or managed by the payer) viaverification network105. Eachverification institution110 may then generate a second signature for the transaction, using the private key hosted byverification network105. The second signature for the transaction may be transmitted byverification institution110 toverification network105 with the verification offer. In some examples, the second signature may represent a private key created and/or maintained by verification institution110 (a verification provider) and/or provided viaverification network105. Accordingly,verification network105 receives at least two signatures (e.g., a first signature fromclient device102 and a second signature from each verification institution110) which are required for the transaction.
In some embodiments, eachverification institution110 may have a pre-established relationship with a user (or subscriber) ofverification network105. For example, eachverification institution110 may prompt the user to submit a verification application, such that eachverification institution110 may vet the user similar to a credit card application process. Accordingly, for each user, eachverification institution110 may set one or more pre-arranged limits, parameters, or contractual duties for each transaction. For example, for a given user,verification institution110 may set a transaction limit of Bitcoin, Litecoin, Ether, etc. to a transaction. In another example, averification institution110 may attempt to limit its liability to a transaction, by contractually agreeing with each user thatverification institution110 is only liable for up to 50% of the transaction amount. Accordingly, when selecting a verification offer, a user may base the decision on, for example, whichverification institution110 offers the best refund policy.
Verification network105 may receive the one or more verification offers from the one or more verification institutions110 (i.e.,verification instate1101,1102, . . . ,110n).Verification network105 may transmit the one or more verification offers toclient device102 andprompt client device102 to select an offer among the verification offer(s).Verification network105 may receive fromclient device102 an indication of a selection of a particular verification offer.Verification network105 may then broadcast the transaction to blockchain network108 (responsive to the selected offer) for posting.Blockchain network108 may include one or more computing devices for processing a blockchain transaction, by generating a block that is added to a blockchain that includes a record for the transaction. The blockchain represents a decentralized, public ledger of all transactions of a blockchain-based currency.
The role played byverification institution110 is similar to a verifier of a transaction. For example,verification institution110 may be responsible for verifying that the payer (e.g., client device102) is indeed the payer and that the payer has the alleged amount of cryptocurrency for the transaction.
In conventional blockchain systems, transactions between a payer and payee are irreversible, because once a payer relinquishes control of the amount of cryptocurrency, the payer can only be made whole if the payee agrees to refund the payer. The present system addresses this limitation by providing anintermediary verification network105 andverification pool106. When one ormore verification institutions110 assess a risk associated with a particular transaction, proposes a verification offer, and receives an acceptance of that verification offer, therespective verification institution110 has taken responsibility for the transaction. In other words, if a fraudulent third party gained access to the payer's account,verification institution110 is responsible for making the payer whole (i.e., refunding the payer the amount transferred to the payee). In this manner, verification institution110 (e.g., a verification provider) may “eat the charges” for any risk miscalculations, thereby reducing the impact of fraud on the payer. Moreover, because various verification institutions110 (e.g., verification providers) ofverification pool106 may compete to perfect a transaction through one or more verification offers,environment100 may spread out any risk miscalculations among the verification providers ofverification pool106, thereby reducing any concentration risk that is conventionally posed by relying on a single verification service provider.
Further, becauseverification network105 supports multi-signature functionality, for each transaction, two or more signatures are necessary to perfect the transaction. In conventional multi-signature systems (e.g., two-signature system), any individual party that has access to at least two of the payer's private keys may take control of the payer's cryptocurrency. Similarly, in conventional systems, any two actors may collude to release or take control of an individual's cryptocurrency by gaining access to at least two private keys of the individual. The present disclosure addresses these limitations of conventional systems by anticipating the possibility that, when the proposed transaction is broadcast toverification pool106, two ormore verification institutions110 may collude to release the payer's funds. To address this, the computing device associated with the payer (e.g., client device102) is a mandatory party to the transaction. In other words, even though one ormore verification institutions110 inverification pool106 may collude and provide the necessary number of signatures required for a specific multi-signature transaction,verification network105 will not perfect the transaction without receiving a signature from the payer.
Examples ofclient device102,verification network105 andverification institution110nare described further below with respect toFIG.2.
FIG.1B is a block diagram150 visually depicting one or more parties to a cryptocurrency transaction, according to example embodiments. As shown, block diagram150 includesverification institution1101,verification institution1102, andverification institution110nas the one ormore verification institutions110. For this transaction, at least two signatures are needed to perfect the transaction from payer to payee.
As illustrated, the verification offers122-1 and122-2 submitted byinstitution1101andinstitution1102, respectively, have been selected by payer (e.g., client device102). In conventional systems, because a minimum of two signature are required, the signature (2/2) generated byverification institution1101and the signature (2/2) generated byverification institution1102would be sufficient to perfect the transaction. Those skilled in the art may readily understand that, ifverification network105 were compromised, and two or more private keys associated withclient device102 were accessed,verification institution1101andverification institution1102could collude to release or gain access to the payer's cryptocurrency. However, such signatures would not be sufficient to perfect the transaction incomputing environment100 because client device102 (includingsignature120 generated by client device102) is a mandatory party to the transaction. Accordingly, at least one of the at least two required signatures must be generated by client device102 (or more generally, the payer). Thus, in the example shown inFIG.1B,signatures124 to perfect the transaction (e.g., for payment) includes signatures (2/3) (i.e.,signature120 ofclient device102 and signatures (2/2) ofrespective verification institutions1101.1102).
FIG.2 is a block diagram illustratingcomputing environment200 for authorizing blockchain transactions, according to one or more exemplary embodiments. As illustrated,computing environment200 includes atleast client device102, at least oneverification institution110, andverification network105.Client device102,verification institution110 andverification network105 may communicate via at least onenetwork205.
Network205 may be of any suitable type, including individual connections via the Internet, such as cellular or Wi-Fi networks. In some embodiments,network205 may connect terminals, services, and mobile devices using direct connections, such as, without being limited to, radio frequency identification (RFID), near-field communication (NFC), Bluetooth™, low-energy Bluetooth™ (BLE), Wi-Fi™, ZigBee™, ambient backscatter communication (ABC) protocols, universal serial bus (USB), wide area network (WAN), or local area network (LAN). Because the information transmitted may be personal or confidential, security concerns may dictate one or more of these types of connections be encrypted or otherwise secured. In some embodiments, however, the information being transmitted may be less personal, and therefore, the network connections may be selected for convenience over security.
Network205 may include any type of computer networking arrangement used to exchange data. For example,network205 may be the Internet, a private data network, a virtual private network using a public network and/or other suitable connection(s) that enables components incomputing environment200 to send and receive information therebetween.
Client device102 may includeapplication252 andwallet254.Application252 may be representative of a web browser that allows access to a website or a stand-alone application.Client device102 may accessapplication252 to access functionality ofverification network105.Client device102 may communicate overnetwork205 to request a webpage, for example, from webclient application server206 ofverification network105. For example,client device102 may be configured to executeapplication252 to access one or more functionalities ofverification network105. The content that is displayed toclient device102 may be transmitted from webclient application server206 toclient device102, and subsequently processed byapplication252 for display through an interactive graphical user interface (GUI) rendered byclient device102.
Wallet254 may be representative of a digital storage location onclient device102.Wallet254 may be configured to store one or morekey pairs255 associated with a user's blockchain account (e.g., account212). As illustrated, eachkey pair255 may include a private key256 and a correspondingpublic key258.
Each private key256 may be an alphanumeric string that allows a user ofclient device102 to transmit (e.g., spend) one or more cryptocurrencies to another individual or entity (i.e., another cryptocurrency address). Private key256 may be used to sign each cryptocurrency transaction. For example, a user may input private key256 into a signature algorithm which outputs a signature that may be verified byverification network105. Any individual or entity that has access to private key256 may be able to access the one or more cryptocurrencies corresponding to private key256.
Eachpublic key258 may correspond to a respective private key256. In some embodiments,public key258 may be derived from its respective private key256.Public key258 may be an alphanumeric string that corresponds to a public address of an individual or entity. For example, when a payer or transmitter attempts to transmit an amount of cryptocurrency to a user ofclient device102, the payer or transmitter directs the transmittal to the address defined bypublic key258.Public key258 may be public because, although derived from a respective private key256, it is near impossible to reverse engineer private key256.
Verification network105 may includemanagement system202 anddatabase204.Management system202 may be representative of a computing system.Management system202 may include webclient application server206,account handler208,transaction agent209, andverification agent210.
Each ofaccount handler208,transaction agent209, andverification agent210 may be comprised of one or more software modules. The one or more software modules may be collections of code or instructions stored on a media (e.g., memory of management system202) that represent a series of machine instructions (e.g., program code) that implements one or more algorithmic steps. Such machine instructions may be the actual computer code that a processor ofmanagement system202 interprets to implement the instructions or, alternatively, may be a higher level of coding of the instructions that is interpreted to obtain the actual computer code. The one or more software modules may also include one or more hardware components. One or more aspects of the algorithm may be performed by the hardware components (e.g., circuitry) itself, rather than as a result of an instruction.
Account handler208 may be configured to manage one ormore accounts212 associated with one or more users. For example,account handler208 may communicate withdatabase204. As illustrated,database204 may include one or more accounts212. Eachaccount212 may include one or morekey pairs215 and one ormore transactions218. Eachkey pair215 may include aprivate key214 and a correspondingpublic key216.Account handler208 may generate one or morekey pairs215 upon a user registering withverification network105. In some embodiments,account handler208 may generate one or morekey pairs255 stored onclient device102.
Eachprivate key214 may be an alphanumeric string that allows one ormore verification institutions110 to verify a particular transaction request.Private key214 may be used to sign each cryptocurrency transaction. For example, averification institution110 may access aprivate key214 fromverification network105, and inputprivate key214 into a signature algorithm which outputs a signature that may be verified byverification network105. Any individual or entity that has access toprivate key214 may be able to access the one or more cryptocurrencies corresponding theprivate key214.
Eachpublic key216 may correspond to a respectiveprivate key214. In some embodiments,public key216 may be derived from its respectiveprivate key214.Public key216 may be an alphanumeric string that corresponds to a public address associated with an individual or entity. For example, when averification institution110 assesses a risk associated with a transaction request,verification institution110 may identify a payer usingpublic key216.Public key216 may be public because, although derived from a respectiveprivate key214, it is near impossible to reverse engineerprivate key214.
Transaction agent209 may be configured to manage one ormore transactions218 associated with eachaccount212. For example,transaction agent209 may act as a “middle-man” betweenclient device102 and one ormore verification institutions110. In operation, for example,transaction agent209 may transmit a transaction request to one ormore verification institutions110. Each of the one ormore verification institutions110 may race to assess the risk associated with verifying the transaction, and provide an offer to the payer for verifying the transaction. For example, each of the one ormore verification institutions110 may transmit to verification network105 a willingness to verify the transaction along with a fee for their verification (e.g., a verification offer). The verification offer may, in turn, be transmitted fromverification network105 toclient device102 for display. Upon receiving input fromclient device102 that corresponds to a selection of a verification offer,verification network105 may transmit the offer acceptance to therespective verification institution110.
After a transaction is finalized between a payer (e.g., client device102) and a payee (e.g., client device104),transaction agent209 may record the transaction indatabase204. For example,transaction agent209 may record the payer to the transaction and the payee to the transaction, along with the transaction amount, in one ormore transactions218. Accordingly, if, for example, the transaction was later deemed fraudulent,transaction agent209 may notify theverification institution110 that verified the transaction, such thatverification institution110 can reimburse the payer to the transaction.
Verification agent210 may be configured to verify one or more transactions between a payer (e.g., client device102) and a payee (e.g., client device104).Verification agent210 may, for example, verify a first signature transmitted fromclient device102 toverification network105 that signals the initiation of the transaction. The first signature may correspond to a first signature needed for a multi-signature transaction.Verification agent210 may further be configured to verify a second signature transmitted from averification institution110, in response to generation of a verification offer fromverification institution110. The second signature may correspond to a second signature (or additional signature) needed for a multi-signature transaction.
Upon receiving the necessary number of signatures required for the multi-signature transaction (e.g., two or more signatures),verification institution110 may communicate withtransaction agent209 to complete the transaction.Transaction agent209 may broadcast the completed transaction toblockchain network108, such that the transaction may be posted thereto.
Verification institution110 may be representative of a computing system associated with any suitable entity such as, for example, a particular financial institution or other trusted entity.Verification institution110 may includecomputing device260.Computing device260 may be a mobile device, a tablet, a desktop computer, or any computing system having the capabilities described herein.Computing device260 may includeapplication262 andrisk analyzer264.
Application262 may be representative of a web browser that allows access to a website or a stand-alone application.Computing device260 may accessapplication262 to access functionality ofverification network105.Computing device260 may communicate overnetwork205 to request a webpage, for example, from webclient application server206 ofverification network105. For example,computing system260 may be configured to executeapplication262 to access one or more functionalities ofverification network105. The content that is displayed tocomputing device260 may be transmitted from webclient application server206 tocomputing device260, and subsequently processed byapplication262 and, in some examples, may be displayed through a GUI rendered by computingsystem260.
Risk analyzer264 may be comprised of one or more software modules. The one or more software modules may be collections of code or instructions stored on a media (e.g., memory of computing device260) that represent a series of machine instructions (e.g., program code) that implements one or more algorithmic steps. Such machine instructions may be the actual computer code a processor ofcomputing device260 interprets to implement the instructions or, alternatively, may be a higher level of coding of the instructions that is interpreted to obtain the actual computer code. The one or more software modules may also include one or more hardware components. One or more aspects of the algorithm may be performed by the hardware components (e.g., circuitry) itself, rather than as a result of an instruction.
Risk analyzer264 may be configured to assess a risk associated with verifying a cryptocurrency transaction between the payer (e.g., client device102) and the payee (e.g., client device104). In some embodiments,risk analyzer264 may assess the risk associated with verifying the cryptocurrency transaction by taking in account one or more parameters that include, but are not limited to, a current location of client device102 (e.g., at a location associated with the user), an amount of cryptocurrency to be transmitted, a frequency of transactions between the payer (e.g., client device102) and the payee (e.g., client device104), the identity of the payee (e.g., a merchant), the time of day of the transaction, a purchase history of the payer, and the like. In some examples, risk analysis byrisk analyzer264 may include contacting the payer (e.g., via a call or text) to confirm the transaction. Based on the risk assessment performed byrisk analyzer264,verification institution110 may generate a verification offer to be transmitted toclient device102.
Because, however, verifying the transaction may subjectverification institution110 to financial risk (e.g., if the transfer fromclient device102 toclient device104 was fraudulent),verification institution110 may charge the payer a fee for their verification service. For example, whenrisk analyzer264 determines that there is minimal risk associated with verifying the transaction,verification institution110 may propose a minimal fee toclient device102 in the verification offer. In another example, whenrisk analyzer264 determines that there is a higher risk associated with verifying the transaction,verification institution110 may propose a higher fee toclient device102 in the verification offer. Further, in some embodiments,verification institution110 may propose a surge fee to a transaction. For example, in those embodiments in whichverification network105 broadcasts a higher volume of verification requests,verification institution110 may propose a surge fee for its services.
FIG.3 is a flow diagram illustrating amethod300 of authorizing a blockchain transaction usingverification network105, according to one or more exemplary embodiments.Method300 may begin atstep302.
Atstep302,verification network105 may receive a transaction request from client device102 (e.g., via a payment card, an application, a mobile phone, online, etc.). The transaction request may include at least a designation of the payer (e.g., client device102), the payee (e.g., client device104), and the amount of cryptocurrency specified in the transaction. For example, the transaction request may include a public address (e.g., public key258) corresponding toclient device102, a signature generated byclient device102 using private key256), a public address corresponding toclient device104, and the amount specified in the transaction. Further, in some embodiments, the transaction request may also specify a number of signatures required for the multi-signature authorization. For example, in some embodiments, the transaction request may specify that at least oneverification institution110 is necessary for verification. In another example, the transaction request may specify that at least two of theverification institutions110 are necessary for verification. In some examples, the transaction request may represent a partially-signed blockchain transaction, that may include a first signature generated by theclient device102 using private key256, but may not include any second signatures needed to perfect the blockchain transaction.
Atstep304,verification network105 may broadcast a verification request toverification pool106. The verification request may include one or more parameters associated with the transaction request. Such parameters may include, but are not limited to, the public address (e.g., public key258) corresponding toclient device102, a public address associated withclient device104, and the amount specified in the transaction. In some examples,verification network105 may determine and include situational details associated with the partially-signed transaction that may be useful (to verification pool106) in analyzing a likelihood of attempted fraud. Non-limiting examples of situational details may include a time of the transaction, a value of the transaction, a geolocation ofclient device102, any merchant statistics, etc. In some examples, the verification request broadcast byverification network105 may include the partially-signed transaction (from client device102) and any additional information and/or risk assessment details (e.g., parameters, situational details, etc.) provided byverification network105. Thus, in some examples, the partially-signed transaction may be enriched by the information provided byverification network105. In some embodiments, the one or more parameters may further include a number of additional signatures needed fromverification pool106 to complete the multi-signature transaction.
Atstep306,verification network105 may receive one or more verification offers based on a risk analysis of the transaction request. For example,verification network105 may receive one or more verification offers from one ormore verification institutions110 to be transmitted toclient device102. Each verification offer may be generated by averification institution110 based on a determined risk with verifying the transaction. Each verification offer may include a verification charge associated therewith.
Atstep308,verification network105 may prompt the payer to select a verification offer from arespective verification institution110.Verification network105 may transmit the one or more verification offers toclient device102 for display.Client device102 may, in turn, push the one or more verification offers toclient device102, prompting the payer to select from among the one or more verification offers.
Atstep310,verification network105 may receive, fromclient device102, an indication of a selection of at least one verification offer. For example,client device102 may receive input via a GUI displayed thereon, which corresponds to a selection of a verification offer from aparticular verification institution110.Client device102 may translate the input to a message that is transmitted toverification network105. The message may indicate the verification offer selected by the payer.
Atstep312,verification network105 may broadcast the transaction betweenclient device102 andclient device104 toblockchain network108. For example, upon determining that the necessary number of signatures required by the transaction request is met,verification network105 may transmit the transaction between payer and payee toblockchain network108 for posting to the blockchain. In some examples, the transaction may also take into account any surcharge fee associated with the selected verification offer(s).
In some examples, the verification request (step304) may include the partially-signed transaction (e.g., the transaction request) and details relating to one or more pre-agreed threshold parameters (e.g., risk assessment details). Responsive to the broadcasted verification request (step304), at least one verification institution110 (e.g., verification institution1102) amongverification pool106 may assess the pre-agreed threshold parameter(s) associated with the partially-signed transaction. The assessing may be a part of a broader risk analysis procedure and the threshold parameter(s) may comprise one or more pre-agreed risk parameters. If the pre-agreed threshold parameter(s) are satisfied, the (at least one) verification institution110 (e.g., verification institution1102) may immediately perfect (e.g., “bless”) the transaction request and broadcast the now-perfected blockchain transaction to blockchain network108 (e.g., bypassing steps306-310). Perfecting the transaction request may include generating a second signature using a second private key (e.g., created and maintained by the verification provider) and optionally imposing a pre-agreed surcharge. In some examples, verification institution110 (e.g., verification institution1102) may broadcast the perfected transaction directly toblockchain network108 and/or viaverification network105. In some examples, a first verification institution110 (e.g., verification institution1102) to assess the risk, perfect the transaction (according to the previously-agreed upon fee) and broadcast the perfected transaction (e.g., the now fully-signed transaction including the first signature fromclient device102 and the second signature from verification institution1102) may prevail and capture the previously-agreed fee.
In the absence of pre-agreed threshold parameter(s), or if the pre-agreed threshold parameter(s) are not satisfied during the assessment, the operation may further include generating, by at least one ofverification institutions110, a respective one or more verification offer(s) including a respective one or more second signatures and, optionally, in some examples, one or more risk-related surcharges. Each of the second signature(s) may be generated by a respective one ofverification institutions110 using a respective second private key (e.g., created and maintained by a respective verification institution110). The verification offer(s) may be transmitted to and received by verification network105 (step306) and step306 may proceed to steps308-310 (as discussed above). In some embodiments, verification institution(s)110 may transmit one or more denials, rather than verification offers. Thus, in some examples, when verification institution(s)110 determine, from the risk analysis, that a risk surcharge is needed to offset risk, the verification offer(s) may include the requested surcharge and an indication to promptclient device102 to select a verification offer. Based on the indication to prompt the payer,verification network105 may promptclient device102 to select a verification offer and may receive a selection from client device102 (as described above at steps308-310). Responsive to the selection fromclient device102,verification network105 may then broadcast the now perfected transaction (e.g., including the first signature fromclient device102 and the second signature in the selected verification offer) to blockchain network108 (step312). In this manner,verification network105 may cause the payer (via client device102) to confirm the blockchain transaction.
FIG.4 is a flow diagram illustrating amethod400 of communication among one or more computing components for authorizing a blockchain transaction usingverification network105, according to one or more exemplary embodiments.Method400 may begin atstep402.
Atstep402,client device102 may transmit a transaction request toverification network105. The transaction request may include at least a designation of the payer (e.g., client device102), the payee (e.g., client device104), and the amount of cryptocurrency specified in the transaction. For example, the transaction request may include a public address (e.g., public key258) corresponding toclient device102, a signature generated byclient device102 using private key256), a public address corresponding toclient device104, and the amount specified in the transaction. Further, in some embodiments, the transaction request may also specify a number of signatures required for the multi-signature authorization. For example, in some embodiments, the transaction request may specify that at least oneverification institution110 is necessary for verification. In another example, the transaction request may specify that at least two of theverification institutions110 is necessary for verification.
Atstep404,verification network105 may receive the transaction request fromclient device102. In some embodiments, upon receiving the transaction request fromclient device102,verification network105 may verify that the payer has indeed signed the transaction. For example,verification network105 may verify thatclient device102 transmitted the signature for the transaction.
Atstep406,verification network105 may broadcast a verification request toverification pool106. The verification request may include one or more parameters associated with the transaction request. Such parameters may include, but are not limited to, the public address (e.g., public key258) corresponding toclient device102, a public address associated withclient device104, and the amount specified in the transaction. In some embodiments, the one or more parameters may further include a number of additional signatures needed fromverification pool106 to complete the multi-signature transaction.
Atstep408,verification institution110 may receive the broadcasted verification request fromverification network105. Although the below operations are discussed generally with respect to one ormore verification institutions110, those skilled in the art may readily understand that it is not required for allverification institutions110 inverification pool106 to perform all of the operations described below.
Atstep410,verification institution110 may assess a risk associated with verifying the transaction request. For example,risk analyzer264 may be configured to assess a risk associated with verifying the cryptocurrency transaction between the payer (e.g., client device102) and the payee (e.g., client device104). In some embodiments,risk analyzer264 may assess the risk associated with verifying the cryptocurrency transaction by taking in account one or more parameters that include, but are not limited to, a current location of client device102 (e.g., at a location associated with the user), an amount of cryptocurrency to be transmitted, a frequency of transactions between the payer (e.g., client device102) and the payee (e.g., client device104), and the like. Based on the risk assessment performed byrisk analyzer264,verification institution110 may generate a verification offer to be transmitted toclient device102.
Atstep412,verification institution110 may assign a verification fee to the verification offer based on the risk assessment analysis. For example,verification institution110 may assign a fee to their verification service based on the risk associated with verifying a particular transaction. For example, ifrisk analyzer264 determines that there is minimal risk associated with verifying the transaction,verification institution110 may propose a minimal fee toclient device102 in the verification offer. In another example, ifrisk analyzer264 determines that there is a higher risk associated with verifying the transaction,verification institution110 may propose a higher fee toclient device102 in the verification offer.
Atstep414,verification institution110 may access a private key associated with the payer. For example, upon generating a verification offer,verification institution110 may request from verification network105 a private key (e.g., private key214) that is hosted byverification network105 and associated with the payer (e.g., client device102).
Atstep416,verification institution110 may generate a signature using the accessed private key. For example,verification institution110 may generate a second (or third, fourth, etc.) signature for the transaction usingprivate key214. By generating a second signature prior to transmitting the verification offer toclient device102, the transaction may be completed as soon as the payer selects a verification offer.
Atstep418,verification institution110 may transmit the verification offer and the second (or additional) signature toverification network105. Atstep420,verification network105 may receive the verification offer and the second signature fromverification institution110.
At step422,verification network105 may prompt the payer to select a verification offer from arespective verification institution110.Verification network105 may transmit the one or more verification offers toclient device102 for display. The verification offer may include the verification fee associated therewith.
Atstep424,client device102 may receive the prompt fromverification network105. For example,client device102 may receive the one or more verification offers fromverification network105 viaapplication252 executing thereon.
Atstep426,client device102 may generate a GUI displaying the one or more verification offers. The GUI generated byclient device102 may be displayed to the payer via a display associated withclient device102. For example, the GUI may be displayed via an external display device (e.g., a monitor) associated withclient device102. In another embodiment, the GUI may be displayed via a touchscreen associated withclient device102. The GUI may include the one or more verification offers and the one or more verification fees associated therewith.
Atstep428,client device102 may receive an input that corresponds to a selection among the verification offer(s). For example,client device102 may receive an input, via the GUI, a selection of a verification offer. Atstep430,client device102 may transmit a verification offer acceptance toverification network105.
Atstep430,verification network105 may receive the selection of the verification offer acceptance fromclient device102. Atstep432,verification network105 may notify arespective verification institution110 of the verification offer acceptance. For example,verification network105 may transmit a message to arespective verification institution110 associated with the verification offer.
At step434,verification network105 may record the transaction details indatabase204. for example,verification network105 may record the transaction date, the transaction amount, the payer public address, the payee public address, any verification fees and one ormore verification institutions110 associated with one or more accepted verification offers indatabase204. By recording the transaction details indatabase204, should the transaction later be deemed fraudulent (e.g., a fraudulent third party obtained the payer's private key (e.g., private key256), the transaction may be reversible. For example, the one ormore verification institutions110 whose verification offers were accepted are now liable for refunding the payer the transaction amount.
Atstep436,verification network105 may broadcast/post the transaction betweenclient device102 andclient device104 toblockchain network108. For example, upon determining that the necessary number of signatures required by the transaction request is met,verification network105 may transmit the transaction between payer and payee toblockchain network108 for posting to the blockchain. In some examples, the transaction may also reflect any verification fees.
Although not shown inFIG.4, as discussed above, in some examples, after step408 (e.g., at step410), verification institution(s)110 may assess pre-agreed threshold parameter(s) associated with the transaction request and determine whether the pre-agreed threshold parameter(s) have been satisfied. If at least one ofverification institutions110 determine that the pre-agreed threshold parameter(s) are satisfied, the at least oneverification institution110 may perfect the blockchain transaction (as discussed above) and broadcast the perfected blockchain transaction to blockchain network108 (thereby bypassing, for example, steps412-434). If the pre-agreed threshold parameter(s) are not satisfied, the process may proceed according to steps412-436.
FIG.5A is a block diagram500 illustrating one or more screenshots ofclient computing device502, according to one or more exemplary embodiments. As illustrated,client device502 may be a mobile device associated with a payer. For example,client device502 may be associated with client device102 (explained in detail above).Client device502 may includedisplay504.Display504 may be currently displayingscreenshot505.Screenshot505 may illustrate an example GUI that may be generated and displayed to the payer upon receiving one or more verification offers fromverification network105.
As shown,screenshot505 includes one or more verification offers5031,5032, and5033(generally “verification offer503”). Verification offer5031may include a graphic5081associated with averification institution1101and verification fee5061associated therewith. Verification offer5032may include a graphic5082associated with averification institution1102and verification fee5062associated therewith. Verification offer5033may include a graphic5083associated with averification institution1103and verification fee5063associated therewith. Each verification offer503 may be selectable by the payer.
FIG.5B is a block diagram550 illustrating one or more screenshots ofclient computing device502, according to one or more exemplary embodiments. As illustrated,display504 ofclient device502 may be currently displayingscreenshot555.Screenshot555 may illustrate an example GUI that may be generated and displayed to the payer upon the payer providing input accepting or rejection a verification offer.
As shown, when a payer provides a select and drag input (e.g., swipe right) the display may update to revealscreenshot555. The payer may be prompted with one or more options for each verification offer503. For example, verification offer5031may include a graphic5521associated with a rejection of the verification offer (e.g. “deny”) and graphic5541associated with an approval of the verification offer (e.g. “approve”). Verification offer5032may include a graphic5522associated with a rejection of the verification offer (e.g. “deny”) and graphic5542associated with an approval of the verification offer (e.g. “approve”). Verification offer5033may include a graphic5523associated with a rejection of the verification offer (e.g. “deny”) and graphic5543associated with an approval of the verification offer (e.g. “approve”).
Upon receiving an input via graphic552 or graphic554,client device102 may transmit to verification network105 a rejection or approval of each verification offer.
It is understood thatFIGS.5A and5B illustrate an example arrangement, presentation and selection operations of verification offers503 ondisplay504 ofclient device502. It is understood that verification offers503 may be arranged and presented in any suitable manner ondisplay504, and that verification offers503 may be selected by one or more suitable input operations including operations other than a select and drag input (e.g., swipe right).
FIG.6 is a block diagram illustrating anexemplary computing environment600, according to one or more embodiments.Computing environment600 may includecomputing system602 andcomputing system652.Computing system602 may be representative ofclient device102.Computing system652 may be representative ofmanagement system202 orverification network105.
Computing system602 may includeprocessor604,memory606,storage608, andnetwork interface610. In some embodiments,computing system602 may be coupled to one or more I/O device(s)612 (e.g., keyboard, mouse, etc.).
Processor604 may retrieve and execute program code618 (i.e., programming instructions) stored inmemory606, as well as store and retrieve application data.Processor604 may be included to be representative of a single processor, multiple processors, a single processor having multiple processing cores, and the like.Network interface610 may be any type of network communications allowingcomputing system602 to communicate externally viacomputing network605. For example,network interface610 may be configured to enable external communication withcomputing system652.
Storage608 may be, for example, a disk storage device. Although shown as a single unit,storage608 may be a combination of fixed and/or removable storage devices, such as fixed disk drives, removable memory cards, optical storage, network attached storage (NAS), storage area network (SAN), and the like.Storage608 may includewallet620.Wallet620 may be configured to store one or more key pairs associated with a user's blockchain account. Each key pair may include a private key and a corresponding public key.
Memory606 may includeapplication614,operating system616 andprogram code618. In some examples,memory606 may include a geolocation agent (not shown).Program code618 may be accessed byprocessor604 for processing (i.e., executing program instructions).Program code618 may include, for example, executable instructions for communicating withcomputing system652 to display one or more pages ofwebsite662.Application614 may enable a user ofcomputing system602 to access a functionality ofcomputing system652. For example,application614 may access content managed by computingsystem652, such aswebsite662. The content that is displayed to a user ofcomputing system602 may be transmitted fromcomputing system652 tocomputing system602, and subsequently processed byapplication614 for display through a GUI ofcomputing system602.
Computing system652 may includeprocessor654,memory656,storage658, andnetwork interface660. In some embodiments,computing system652 may be coupled to one or more I/O device(s)674. In some embodiments,computing system652 may be in communication withdatabase204.
Processor654 may retrieve and execute program code666 (i.e., programming instructions) stored inmemory656, as well as store and retrieve application data.Processor654 is included to be representative of a single processor, multiple processors, a single processor having multiple processing cores, and the like.Network interface660 may be any type of network communications enablingcomputing system652 to communicate externally viacomputing network605. For example,network interface660 may allowcomputing system652 to communicate withcomputer system602.
Storage658 may be, for example, a disk storage device. Although shown as a single unit,storage658 may be a combination of fixed and/or removable storage devices, such as fixed disk drives, removable memory cards, optical storage, network attached storage (NAS), storage area network (SAN), and the like.
Memory656 may includewebsite662,operating system664,program code666,account handler668,verification agent670, andtransaction agent672.Program code666 may be accessed byprocessor654 for processing (i.e., executing program instructions).Program code666 may include, for example, executable instructions configured to perform steps discussed above in conjunction withFIGS.3-4. As an example,processor654 may accessprogram code666 to perform operations for verifying a cryptocurrency transaction.Website662 may be accessed by computingsystem602. For example,website662 may include content accessed by computingsystem602 via a web browser or application.
Account handler668 may be configured to manage one or more accounts associated with one or more users. For example,account handler668 may communicate withdatabase204 that stores one or more key pairs215 (FIG.2).Account handler668 may generate one or more key pairs upon a user registering withverification network105. In some embodiments,account handler668 may generate one or more key pairs stored oncomputing system602.
Transaction agent672 may be configured to manage one or more transactions associated with each account. For example,transaction agent672 may act as a “middle-man” betweencomputing system602 and one ormore verification institutions110. In operation, for example,transaction agent672 may transmit the transaction request to one ormore verification institutions110. Upon receiving input fromcomputing system602 that corresponds to a selection of a verification offer,transaction agent672 may transmit the offer acceptance to therespective verification institution110.
Verification agent670 may be configured to verify one or more transactions between a payer and a payee.Verification agent670 may, for example, verify a first signature transmitted fromclient device602 toverification network105 that signals the initiation of the transaction. The first signature may correspond to a first signature needed for a multi-signature transaction.Verification agent670 may further be configured to verify a second signature transmitted from a verification institution, in response to generation of a verification offer fromverification institution110. The second signature may correspond to a second signature (or additional signature) needed for a multi-signature transaction.
Although not shown inFIG.6, eachverification institution110 may also include one or more of the components shown incomputing system652. For example,verification institution110 may include a processor similar toprocessor654, memory similar tomemory656, storage similar tostorage658, a network interface similar tonetwork interface660 and, in some examples, one or more I/O devices similar to I/O device(s)674. Similar tomemory656 ofcomputing system652, the memory ofverification institution110 may also include an operating system similar tooperating system664 and program code similar toprogram code666. In contrast tomemory656 ofcomputing system652, the memory ofverification institution110 may store application262 (FIG.2) and risk analyzer264 (FIG.2), and the program code ofverification institution110 may include program instructions relating toapplication260 andrisk analyzer264.
It is understood that aspects of the present disclosure may be implemented in hardware or software or a combination of hardware and software. In one example, aspects of the present disclosure may be implemented as a program product for use with a computer system. The program(s) of the program product define functions of the embodiments (including the methods described herein) and can be contained on a variety of computer-readable storage media. Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory (ROM) devices within a computer, such as compact disk-ROM (CD-ROM) disks readable by a CD-ROM drive, flash memory, ROM chips, or any type of solid-state non-volatile memory) on which information is permanently stored; and (ii) writable storage media (e.g., floppy disks within a diskette drive or hard-disk drive or any type of solid state random-access memory (RAM)) on which alterable information is stored. Such computer-readable storage media, when carrying computer-readable instructions that direct the functions of the present disclosure, are embodiments of the present disclosure.
While the present disclosure has been discussed in terms of certain embodiments, it should be appreciated that the present disclosure is not so limited. The embodiments are explained herein by way of example, and there are numerous modifications, variations and other embodiments that may be employed that would still be within the scope of the present disclosure.

Claims (30)

The invention claimed is:
1. A system comprising:
one or more verification computing systems; and
a verification network comprising a computing system having a processor and a memory storing programming instructions, the verification network configured to:
receive a proposed blockchain transaction generated by at least one payer device, and
broadcast a verification request for the proposed blockchain transaction to the one or more verification computing systems,
the one or more verification computing systems configured to determine whether the proposed blockchain transaction includes one or more pre-agreed threshold parameters, responsive to the verification request,
when the proposed blockchain transaction includes and satisfies the one or more pre-agreed threshold parameters, the one or more verification computing systems are configured to:
directly perfect the proposed blockchain transaction to create a perfected blockchain transaction, and
broadcast the perfected blockchain transaction directly to a blockchain network, and
when the proposed blockchain transaction fails to include the one or more pre-agreed threshold parameters or fails to satisfy the one or more pre-agreed threshold parameters:
the one or more verification computing systems are configured to perfect the proposed blockchain transaction via prompting authorization from the at least one payer device, and
the verification network is configured to broadcast the perfected blockchain transaction to the blockchain network, responsive to receiving said authorization from the at least one payer device.
2. The system ofclaim 1, wherein the proposed blockchain transaction comprises a first signature that is generated using a first private key.
3. The system ofclaim 2, wherein the first private key is generated and maintained by the at least one payer device.
4. The system ofclaim 3, wherein the perfecting of the proposed blockchain transaction comprises generating one or more additional signatures using a second private key.
5. The system ofclaim 4, wherein the second private key is generated and maintained by the one or more verification computing systems.
6. The system ofclaim 1, wherein when the proposed blockchain transaction fails to include the one or more pre-agreed threshold parameters or fails to satisfy the one or more pre-agreed threshold parameters:
the one or more verification computing systems are configured to perfect the proposed blockchain transaction by generating and transmitting one or more verification offers to the at least one payer device,
responsive to receiving the one or more verification offers, the at least one payer device is configured to transmit a selection of at least one offer from among the one or more verification offers to the verification network, the selection indicating the authorization of the proposed blockchain transaction, and
upon receiving said selection, the verification network is configured to broadcast the perfected blockchain transaction to the blockchain network.
7. The system ofclaim 6, wherein the at least one payer device is configured to display the one or more verification offers via a graphical user interface of the at least one payer device.
8. The system ofclaim 6, wherein the one or more verification computing systems are configured to generate the one or more verification offers based on a risk analysis of the proposed blockchain transaction.
9. The system ofclaim 8, wherein the one or more verification offers comprise one or more of an indication of a transaction risk based on the risk analysis, a verification charge based on the risk analysis, and a surge charge based on a volume of verifications requests received by the one or more verification computing systems.
10. The system ofclaim 8, wherein the one or more verification computing systems are configured to assess a risk associated with verifying the proposed blockchain transaction.
11. The system ofclaim 10, wherein the risk is based on one or more of a location of the at least one payer device, a transaction amount, a frequency of transactions between a payer associated with the at least one payer device and a payee, an identity of the payee, a time of the proposed blockchain transaction, and a purchase history of the payer.
12. The system ofclaim 6, wherein the verification network further comprises an account handler, a transaction agent, a verification agent, and a database, wherein:
the account handler is configured to generate one or more key pairs, each key pair comprising a public key and a private key, and each key pair associated with a particular user, and to store said one or more key pairs in the database,
the transaction agent is configured to perform one or more of:
broadcasting the verification request to the one or more verification computing systems,
recording the perfected blockchain transaction in the database, and
broadcasting the perfected blockchain transaction to the blockchain network, and
the verification agent is configured to verify at least one of a first signature and one or more additional signatures.
13. The system ofclaim 12, wherein:
the account handler is configured to grant access to at least one private key among the one or more key pairs to the one or more verification computing systems, and
the one or more verification computing systems are configured to generate one or more additional signatures using said at least one private key.
14. The system ofclaim 1, wherein the proposed blockchain transaction comprises one or more of a public key associated with the at least one payer device, payee address information associated with a payee, a public key associated with the payee, a transaction amount and a specification of two or more additional signatures to perfect the proposed blockchain transaction.
15. The system ofclaim 1, wherein the one or more verification computing systems are configured to:
prompt the at least one payer device to authenticate with the one or more verification computing systems,
confirm an identity of a payer associated with the at least one payer device, and
verify that an account associated with the payer includes a transaction amount.
16. The system ofclaim 1, wherein the verification network is configured to incorporate situational detail data to the proposed blockchain transaction, the situational detail data comprising one or more of transaction information, geolocation data, and merchant data, the verification request including the situational detail data.
17. The system ofclaim 16, wherein the transaction information comprises one or more of a time and a value, and the merchant data comprises merchant statistics data.
18. The system ofclaim 16, wherein the one or more verification computing systems are configured to analyze the situational detail data in the verification request to determine a likelihood of fraud associated with the proposed blockchain transaction.
19. The system ofclaim 18, wherein the one or more verification computing systems are configured to perfect the proposed blockchain transaction responsive to said analyzing of the situational detail data and said determining of whether the proposed blockchain transaction includes the one or more pre-agreed threshold parameters.
20. The system ofclaim 18, wherein the one or more verification computing systems are configured to reverse the perfected blockchain transaction responsive to determining that the proposed blockchain transaction is fraudulent.
21. A non-transitory computer-readable storage media carrying computer-readable instructions that, when executed by one or more processors, direct the one or more processors to perform the functions of:
receiving a proposed blockchain transaction generated by at least one payer device; and
broadcasting a verification request for the proposed blockchain transaction to one or more verification computing systems,
wherein, upon receiving the verification request, the one or more verification computing systems being caused to perform the functions of:
determining whether the proposed blockchain transaction includes one or more pre-agreed threshold parameters, responsive to the verification request;
when the proposed blockchain transaction includes and satisfies the one or more pre-agreed threshold parameters:
directly perfecting the proposed blockchain transaction to create a perfected blockchain transaction, and
broadcasting the perfected blockchain transaction directly to a blockchain network; and
when the proposed blockchain transaction fails to include the one or more pre-agreed threshold parameters or fails to satisfy the one or more pre-agreed threshold parameters:
perfecting the proposed blockchain transaction via prompting authorization from the at least one payer device, and
broadcasting, via the one or more processors, the perfected blockchain transaction to the blockchain network, responsive to receiving said authorization from the at least one payer device.
22. The non-transitory computer-readable storage media ofclaim 21, wherein the proposed blockchain transaction comprises a first signature that is generated using a first private key, the first private key being generated and maintained by the at least one payer device.
23. The non-transitory computer-readable storage media ofclaim 22, wherein the perfecting of the proposed blockchain transaction comprises generating one or more additional signatures using a second private key, the second private key being generated and maintained by the one or more verification computing systems.
24. The non-transitory computer-readable storage media ofclaim 21, wherein when the proposed blockchain transaction fails to include the one or more pre-agreed threshold parameters or fails to satisfy the one or more pre-agreed threshold parameters:
the perfecting of the proposed blockchain transaction comprises generating and transmitting, by the one or more verification computing systems, one or more verification offers to the at least one payer device;
transmitting, responsive to receiving the one or more verification offers, by the at least one payer device, a selection of at least one offer from among the one or more verification offers to the one or more processors, the selection indicating the authorization of the proposed blockchain transaction; and
broadcasting, upon receiving said selection the perfected blockchain transaction to the blockchain network.
25. The non-transitory computer-readable storage media ofclaim 24, wherein the functions further comprise:
generating one or more key pairs, each key pair comprising a public key and a private key, and each key pair associated with a particular user, and storing said one or more key pairs in a database;
performing one or more of:
broadcasting the verification request to the one or more verification computing systems,
recording the perfected blockchain transaction in the database, and
broadcasting the perfected blockchain transaction to the blockchain network; and
verifying at least one of a first signature and one or more additional signatures.
26. The non-transitory computer-readable storage media ofclaim 21, wherein the proposed blockchain transaction comprises one or more of a public key associated with the at least one payer device, payee address information associated with a payee, a public key associated with the payee, a transaction amount and a specification of two or more additional signatures to perfect the proposed blockchain transaction.
27. The non-transitory computer-readable storage media ofclaim 21, wherein the functions further comprise:
incorporating situational detail data to the proposed blockchain transaction, the situational detail data comprising one or more of transaction information, geolocation data, and merchant data, the verification request including the situational detail data.
28. The non-transitory computer-readable storage media ofclaim 27, wherein the functions further comprise:
analyzing, by the one or more verification computing systems, the situational detail data in the verification request to determine a likelihood of fraud associated with the proposed blockchain transaction.
29. The non-transitory computer-readable storage media ofclaim 28, wherein the functions further comprise:
perfecting, by the one or more verification computing systems, the proposed blockchain transaction responsive to said analyzing of the situational detail data and said determining of whether the proposed blockchain transaction includes the one or more pre-agreed threshold parameters.
30. The non-transitory computer-readable storage media ofclaim 28, wherein the functions further comprise:
reversing, by the one or more verification computing systems, the perfected blockchain transaction responsive to determining that the proposed blockchain transaction is fraudulent.
US18/829,6612018-09-062024-09-10Multi-signature verification networkActiveUS12327242B2 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US18/829,661US12327242B2 (en)2018-09-062024-09-10Multi-signature verification network
US19/199,644US20250265580A1 (en)2018-09-062025-05-06Multi-signature verification network

Applications Claiming Priority (10)

Application NumberPriority DateFiling DateTitle
US201862727824P2018-09-062018-09-06
US16/561,295US10621579B2 (en)2018-09-062019-09-05Multi-signature verification network
US16/808,127US10922685B2 (en)2018-09-062020-03-03Multi-signature verification network
US17/003,044US11004068B2 (en)2018-09-062020-08-26Multi-signature verification network
US17/226,142US11120435B2 (en)2018-09-062021-04-09Multi-signature verification network
US17/400,236US11386423B2 (en)2018-09-062021-08-12Multi-signature verification network
US17/752,251US11615408B2 (en)2018-09-062022-05-24Multi-signature verification network
US18/110,011US11928673B2 (en)2018-09-062023-02-15Multi-signature verification network
US18/435,321US12125026B2 (en)2018-09-062024-02-07Multi-signature verification network
US18/829,661US12327242B2 (en)2018-09-062024-09-10Multi-signature verification network

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US18/435,321ContinuationUS12125026B2 (en)2018-09-062024-02-07Multi-signature verification network

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US19/199,644ContinuationUS20250265580A1 (en)2018-09-062025-05-06Multi-signature verification network

Publications (2)

Publication NumberPublication Date
US20240428234A1 US20240428234A1 (en)2024-12-26
US12327242B2true US12327242B2 (en)2025-06-10

Family

ID=68981713

Family Applications (10)

Application NumberTitlePriority DateFiling Date
US16/561,295ActiveUS10621579B2 (en)2018-09-062019-09-05Multi-signature verification network
US16/808,127ActiveUS10922685B2 (en)2018-09-062020-03-03Multi-signature verification network
US17/003,044ActiveUS11004068B2 (en)2018-09-062020-08-26Multi-signature verification network
US17/226,142ActiveUS11120435B2 (en)2018-09-062021-04-09Multi-signature verification network
US17/400,236ActiveUS11386423B2 (en)2018-09-062021-08-12Multi-signature verification network
US17/752,251ActiveUS11615408B2 (en)2018-09-062022-05-24Multi-signature verification network
US18/110,011ActiveUS11928673B2 (en)2018-09-062023-02-15Multi-signature verification network
US18/435,321ActiveUS12125026B2 (en)2018-09-062024-02-07Multi-signature verification network
US18/829,661ActiveUS12327242B2 (en)2018-09-062024-09-10Multi-signature verification network
US19/199,644PendingUS20250265580A1 (en)2018-09-062025-05-06Multi-signature verification network

Family Applications Before (8)

Application NumberTitlePriority DateFiling Date
US16/561,295ActiveUS10621579B2 (en)2018-09-062019-09-05Multi-signature verification network
US16/808,127ActiveUS10922685B2 (en)2018-09-062020-03-03Multi-signature verification network
US17/003,044ActiveUS11004068B2 (en)2018-09-062020-08-26Multi-signature verification network
US17/226,142ActiveUS11120435B2 (en)2018-09-062021-04-09Multi-signature verification network
US17/400,236ActiveUS11386423B2 (en)2018-09-062021-08-12Multi-signature verification network
US17/752,251ActiveUS11615408B2 (en)2018-09-062022-05-24Multi-signature verification network
US18/110,011ActiveUS11928673B2 (en)2018-09-062023-02-15Multi-signature verification network
US18/435,321ActiveUS12125026B2 (en)2018-09-062024-02-07Multi-signature verification network

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US19/199,644PendingUS20250265580A1 (en)2018-09-062025-05-06Multi-signature verification network

Country Status (3)

CountryLink
US (10)US10621579B2 (en)
EP (1)EP3621015B1 (en)
CA (1)CA3054228A1 (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10621579B2 (en)*2018-09-062020-04-14Intercontinental Exchange Holdings, Inc.Multi-signature verification network
US11809403B2 (en)*2019-12-162023-11-07The Toronto-Dominion BankSecure distribution of digital assets within a computing environment using permissioned distributed ledgers
US11456869B2 (en)*2019-12-162022-09-27The Toronto-Dominion BankSecure management of transfers of digital assets between computing devices using permissioned distributed ledgers
US11336440B2 (en)*2019-12-162022-05-17The Toronto-Dominion BankSecure management and regeneration of cryptographic keys within a computing environment using permissioned distributed ledgers
US12099997B1 (en)2020-01-312024-09-24Steven Mark HoffbergTokenized fungible liabilities
US12217246B2 (en)*2020-04-062025-02-04Mastercard Asia/Pacific Pte. Ltd.Method and system for use of an EMV card in a multi-signature wallet for cryptocurrency transactions
CN111476572B (en)*2020-04-092024-03-19财付通支付科技有限公司Block chain-based data processing method, device, storage medium and equipment
CN112184188A (en)*2020-06-202021-01-05黄立峰Transaction processing method and device, electronic equipment and storage medium
CN111754233B (en)*2020-06-292023-11-07兴唐通信科技有限公司Electronic payment method and system based on multiparty signature
CN112116350B (en)*2020-09-072021-11-23上海勒微科技有限公司Payment network environment detection method applied to block chain payment and network server
CN112184960B (en)*2020-09-282022-08-02杭州安恒信息技术股份有限公司 A smart lock control method, device, smart lock, system and storage medium
US20240062205A1 (en)*2020-12-112024-02-22Checksig S.R.L.Device, system and method for managing cryptocurrency transactions
EP4285545A4 (en)2021-03-122024-08-07Kanovitz, Michael Ira AUTHENTICATED MODIFICATION OF BLOCKCHAIN-BASED DATA
US11831666B2 (en)2021-04-092023-11-28International Business Machines CorporationBlockchain data breach security and cyberattack prevention
US11677552B2 (en)*2021-09-092023-06-13Coinbase Il Rd Ltd.Method for preventing misuse of a cryptographic key
US20230396445A1 (en)*2022-06-062023-12-07Salesforce, Inc.Multi-signature wallets in public trust ledger actions via a database system
US20250029097A1 (en)*2023-07-172025-01-23Rajeev NaikMethod And System For Payment Transaction Approval

Citations (75)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO1998037655A1 (en)1996-12-201998-08-27Financial Services Technology ConsortiumMethod and system for processing electronic documents
US6877093B1 (en)*2000-06-062005-04-05Commerciant, L.P.System and method for secure provisioning and configuration of a transaction processing device
US7794074B2 (en)2002-12-202010-09-14Inca Digital Printers LimitedCuring
US20150356555A1 (en)2014-06-042015-12-10Antti PennanenSystem and method for executing financial transactions
US20160324977A1 (en)2014-01-082016-11-10Haemostatix LimitedPeptide dendrimers comprising fibrinogen-binding peptides
US20160342977A1 (en)2015-05-202016-11-24Vennd.io Pty LtdDevice, method and system for virtual asset transactions
US20170017036A1 (en)2015-07-172017-01-19Spi Lasers Uk LimitedApparatus for combining optical radiation
US20170236196A1 (en)2014-03-312017-08-17Monticello Enterprises, LlcSystem and method for transitioning from a first site to a destination site in a one click purchasing state
US20170236121A1 (en)2016-02-112017-08-17Mastercard International IncorporatedMethod and system for offline blockchain exchanges
US20170256001A1 (en)2014-03-312017-09-07Monticello Enterprises LLCSystem and method for providing messenger application for product purchases
US20170286951A1 (en)2016-04-042017-10-05Moving Media GmbHDynamic Delivery Authorization for Cryptographic Payments
US20170323294A1 (en)2016-05-062017-11-09Mastercard International IncorporatedMethod and system for instantaneous payment using recorded guarantees
US20170345105A1 (en)2014-03-312017-11-30Monticello Enterprises, LlcSystem and method for providing multiple payment method options to users in connection with a browser payment request api
US20170352027A1 (en)*2016-06-072017-12-07Cornell UniversityAuthenticated data feed for blockchains
US20170372392A1 (en)2016-06-242017-12-28Raise Marketplace Inc.Securely processing exchange items in a data communication system
US9870562B2 (en)2015-05-212018-01-16Mastercard International IncorporatedMethod and system for integration of market exchange and issuer processing for blockchain-based transactions
US20180025435A1 (en)2016-07-222018-01-25Nec Europe Ltd.Method for secure ledger distribution and computer system using secure distributed ledger technology
US20180025442A1 (en)2014-03-312018-01-25Monticello Enterprises LLCSystem and method for managing cryptocurrency payments via the payment request api
US20180101906A1 (en)2016-10-072018-04-12The Toronto-Dominion BankSecure element method for distributed electronic ledger
US9948467B2 (en)2015-12-212018-04-17Mastercard International IncorporatedMethod and system for blockchain variant using digital signatures
US9967261B2 (en)2014-04-032018-05-08Prote.US Converged Systems CorporationMethod and system for secure authentication
US20180144153A1 (en)2016-11-212018-05-24Adobe Systems IncorporatedProviding user control of shared personal information
WO2018140913A1 (en)2017-01-302018-08-02SALT Lending Holdings, Inc.System and method of creating an asset based automated secure agreement
US20180240165A1 (en)2017-02-222018-08-23Red Hat, Inc.Blockchain-based software instance usage determination
US20180247191A1 (en)*2017-02-032018-08-30Milestone Entertainment LlcArchitectures, systems and methods for program defined entertainment state system, decentralized cryptocurrency system and system with segregated secure functions and public functions
US20180293583A1 (en)2017-04-052018-10-11Samsung Sds Co., Ltd.Method for calculating confirmation reliability for blockchain based transaction and blockchain network monitoring system for performing the method
US20180294967A1 (en)2017-04-072018-10-11Citizen HexTechniques for increasing the probability that a transaction will be included in a target block of a blockchain
US20190057454A1 (en)2017-08-182019-02-21United Parcel Service Of America, Inc.Immutable electronic platform for insurance selection
US20190114706A1 (en)2017-10-172019-04-18SALT Lending Holdings, Inc.Blockchain oracle for managing loans collateralized by digital assets
US20190132350A1 (en)2017-10-302019-05-02Pricewaterhousecoopers LlpSystem and method for validation of distributed data storage systems
US20190147431A1 (en)2017-11-162019-05-16Blockmason Inc.Credit Protocol
US20190173872A1 (en)2017-12-042019-06-06Mastercard International IncorporatedMethod and system for trustworthiness using digital certificates
US10354325B1 (en)2013-06-282019-07-16Winklevoss Ip, LlcComputer-generated graphical user interface
US20190238525A1 (en)*2018-01-312019-08-01Salesforce.Com, Inc.Systems, methods, and apparatuses for implementing super community and community sidechains with consent management for distributed ledger technologies in a cloud based computing environment
US20190236298A1 (en)2018-01-292019-08-01Vinay Kumar AgarwalProof-of-approval distributed ledger
US10380685B1 (en)2018-05-182019-08-13Capital One Services, LlcSecure system
US20190251199A1 (en)*2018-02-142019-08-15Ivan KlianevTransactions Across Blockchain Networks
US20190296915A1 (en)2017-08-052019-09-26Proclus Technologies LimitedMethod and System for Implementing Automatic Transaction Rebroadcasting for Transient Blockchains
US20190306137A1 (en)2014-03-312019-10-03Monticello Enterprises LLCSystem and method for providing a social media shopping experience
US20190334726A1 (en)2018-04-302019-10-31Dell Products L.P.Blockchain-based method and system for immutable resource allocation in a cloud computing environment
US20190347656A1 (en)2018-05-102019-11-14Alibaba Group Holding LimitedBlockchain member management data processing methods, apparatuses, servers, and systems
US20190392439A1 (en)2018-09-062019-12-26Intercontinental Exchange Holdings, Inc.Multi-signature verification network
US10521780B1 (en)2015-12-162019-12-31United Services Automobile Association (Usaa)Blockchain based transaction management
US20200004846A1 (en)2018-06-282020-01-02International Business Machines CorporationDelegating credentials with a blockchain member service
US20200014529A1 (en)2018-07-092020-01-09At&T Intellectual Property I, L.P.Location-Based Blockchain
US20200051068A1 (en)2018-07-032020-02-13Radpay, Inc.Dynamic provisioning of wallets in a secure payment system
US10600050B1 (en)2019-03-222020-03-24Onli, Inc.Secure custody of a ledger token and/or a quantity of cryptocurrency of a distributed ledger network through binding to a possession token
US10616324B1 (en)2017-07-202020-04-07Architecture Technology CorporationDecentralized ledger system and method for enterprises
US20200117730A1 (en)2018-10-162020-04-16Microsoft Technology Licensing, LlcDatabase management
US10643266B2 (en)2014-03-312020-05-05Monticello Enterprises LLCSystem and method for in-app payments
US10693872B1 (en)2019-05-172020-06-23Q5ID, Inc.Identity verification system
US10698728B1 (en)2019-11-152020-06-30Blockstack PbcSystems and methods for forming application-specific blockchains
US10726472B2 (en)2014-03-312020-07-28Monticello Enterprises LLCSystem and method for providing simplified in-store, product-based and rental payment processes
US10749669B2 (en)2017-02-172020-08-18Alibaba Group Holding LimitedBlockchain system and data storage method and apparatus
US10762478B1 (en)2017-08-042020-09-01Wells Fargo Bank, N.A.Creating and managing private electronic currency
US10762506B1 (en)2017-05-112020-09-01United Services Automobile AssociationToken device for distributed ledger based interchange
US20200294033A1 (en)2019-03-152020-09-17BitScan Pty LtdAutomatically assigning cryptographic tokens to cryptocurrency wallet addresses via a smart contract in response to analysis of transaction data
US10789244B1 (en)2018-02-142020-09-29Alibaba Group Holding LimitedAsset management system, method, apparatus, and electronic device
US10824746B1 (en)2017-01-252020-11-03State Farm Mutual Automobile Insurance CompanySystems and methods for controlled access to blockchain data
US10839320B2 (en)2018-12-182020-11-17Rokfin, Inc.Determining network-effects with decentralized applications
US20200374113A1 (en)2018-02-092020-11-26Orbs Ltd.Decentralized application platform for private key management
US10885523B1 (en)2017-04-062021-01-05Amino Payments, Inc.Methods, systems, and media for protecting transactions with secure payment authorization channels
US10939405B1 (en)2019-04-082021-03-02Helium Systems, Inc.Systems and methods for implementing permissionless network consensus using blockchain
US11244313B2 (en)2019-01-312022-02-08Salesforce.Com, Inc.Systems, methods, and apparatuses for implementing declarative smart actions for coins and assets transacted onto a blockchain using distributed ledger technology (DLT)
US11310052B1 (en)*2018-07-312022-04-19Block, Inc.Identity authentication blockchain
US20220122062A1 (en)2018-08-012022-04-21Jonathan MayblumSystems and methods for facilitating transactions using a digital currency
US11423475B2 (en)2016-09-272022-08-23Visa International Service AssociationDistributed electronic record and transaction history
US11455642B1 (en)2016-09-192022-09-27United Services Automobile Association (Usaa)Distributed ledger based interchange
US20220309511A1 (en)*2016-06-242022-09-29Raise Marketplace, LlcDetermining a fraud abatement approach for a potentially fraudulent exchange item
US20220318788A1 (en)2021-03-312022-10-06Paypal, Inc.Using an internal ledger with blockchain transactions
US11475419B2 (en)*2018-04-302022-10-18Robert Dale BeadlesUniversal subscription and cryptocurrency payment management platforms and methods of use
US20230177167A1 (en)2021-12-082023-06-08Paypal, Inc.Automatic verification of decentrailized protocols
US20230245117A1 (en)*2019-02-082023-08-03Nicholas David BeaugeardDistributed Ledger Computing Platforms and Associated Methods, Systems and Devices
US20230334492A1 (en)*2022-04-152023-10-19Block, Inc.Blockchain agnostic token network
US11888730B1 (en)2022-09-202024-01-30Block, Inc.Dynamically optimizing routing within a decentralized network

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11095446B2 (en)*2018-02-272021-08-17Anchor Labs, Inc.Cryptoasset custodial system with different rules governing access to logically separated cryptoassets and proof-of-stake blockchain support
US11301845B2 (en)*2019-08-192022-04-12Anchor Labs, Inc.Cryptoasset custodial system with proof-of-stake blockchain support
US11095431B2 (en)*2019-12-132021-08-17DLT Global, Inc.Blockchain transaction manager

Patent Citations (84)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO1998037655A1 (en)1996-12-201998-08-27Financial Services Technology ConsortiumMethod and system for processing electronic documents
US6877093B1 (en)*2000-06-062005-04-05Commerciant, L.P.System and method for secure provisioning and configuration of a transaction processing device
US7794074B2 (en)2002-12-202010-09-14Inca Digital Printers LimitedCuring
US10354325B1 (en)2013-06-282019-07-16Winklevoss Ip, LlcComputer-generated graphical user interface
US20160324977A1 (en)2014-01-082016-11-10Haemostatix LimitedPeptide dendrimers comprising fibrinogen-binding peptides
US10511580B2 (en)2014-03-312019-12-17Monticello Enterprises LLCSystem and method for providing a social media shopping experience
US10121186B2 (en)2014-03-312018-11-06Monticello Enterprises LLCSystem and method of using a browser application programming interface for making payments
US20170236196A1 (en)2014-03-312017-08-17Monticello Enterprises, LlcSystem and method for transitioning from a first site to a destination site in a one click purchasing state
US9922380B2 (en)2014-03-312018-03-20Monticello Enterprises LLCSystem and method for providing messenger application for product purchases
US20170256001A1 (en)2014-03-312017-09-07Monticello Enterprises LLCSystem and method for providing messenger application for product purchases
US10643266B2 (en)2014-03-312020-05-05Monticello Enterprises LLCSystem and method for in-app payments
US10726472B2 (en)2014-03-312020-07-28Monticello Enterprises LLCSystem and method for providing simplified in-store, product-based and rental payment processes
US20170345105A1 (en)2014-03-312017-11-30Monticello Enterprises, LlcSystem and method for providing multiple payment method options to users in connection with a browser payment request api
US20190306137A1 (en)2014-03-312019-10-03Monticello Enterprises LLCSystem and method for providing a social media shopping experience
US9922381B2 (en)2014-03-312018-03-20Monticello Enterprises LLCSystem and method for providing a payment handler API and a browser payment request API for processing a payment
US20180025442A1 (en)2014-03-312018-01-25Monticello Enterprises LLCSystem and method for managing cryptocurrency payments via the payment request api
US9967261B2 (en)2014-04-032018-05-08Prote.US Converged Systems CorporationMethod and system for secure authentication
US20150356555A1 (en)2014-06-042015-12-10Antti PennanenSystem and method for executing financial transactions
US20160342977A1 (en)2015-05-202016-11-24Vennd.io Pty LtdDevice, method and system for virtual asset transactions
US9870562B2 (en)2015-05-212018-01-16Mastercard International IncorporatedMethod and system for integration of market exchange and issuer processing for blockchain-based transactions
US20170017036A1 (en)2015-07-172017-01-19Spi Lasers Uk LimitedApparatus for combining optical radiation
US10521780B1 (en)2015-12-162019-12-31United Services Automobile Association (Usaa)Blockchain based transaction management
US20180212783A1 (en)2015-12-212018-07-26Mastercard International IncorporatedMethod and system blockchain variant using digital signatures
US9948467B2 (en)2015-12-212018-04-17Mastercard International IncorporatedMethod and system for blockchain variant using digital signatures
US10171248B2 (en)2015-12-212019-01-01Mastercard International IncorporatedMethod and system blockchain variant using digital signatures
US20170236121A1 (en)2016-02-112017-08-17Mastercard International IncorporatedMethod and system for offline blockchain exchanges
US20170286951A1 (en)2016-04-042017-10-05Moving Media GmbHDynamic Delivery Authorization for Cryptographic Payments
US20170323294A1 (en)2016-05-062017-11-09Mastercard International IncorporatedMethod and system for instantaneous payment using recorded guarantees
US20170352027A1 (en)*2016-06-072017-12-07Cornell UniversityAuthenticated data feed for blockchains
US11062366B2 (en)2016-06-242021-07-13Raise Marketplace Inc.Securely processing exchange items in a data communication system
US20220309511A1 (en)*2016-06-242022-09-29Raise Marketplace, LlcDetermining a fraud abatement approach for a potentially fraudulent exchange item
US20170372392A1 (en)2016-06-242017-12-28Raise Marketplace Inc.Securely processing exchange items in a data communication system
US20180025435A1 (en)2016-07-222018-01-25Nec Europe Ltd.Method for secure ledger distribution and computer system using secure distributed ledger technology
US11455642B1 (en)2016-09-192022-09-27United Services Automobile Association (Usaa)Distributed ledger based interchange
US11423475B2 (en)2016-09-272022-08-23Visa International Service AssociationDistributed electronic record and transaction history
US20180101906A1 (en)2016-10-072018-04-12The Toronto-Dominion BankSecure element method for distributed electronic ledger
US20180144153A1 (en)2016-11-212018-05-24Adobe Systems IncorporatedProviding user control of shared personal information
US10824746B1 (en)2017-01-252020-11-03State Farm Mutual Automobile Insurance CompanySystems and methods for controlled access to blockchain data
WO2018140913A1 (en)2017-01-302018-08-02SALT Lending Holdings, Inc.System and method of creating an asset based automated secure agreement
US20180247191A1 (en)*2017-02-032018-08-30Milestone Entertainment LlcArchitectures, systems and methods for program defined entertainment state system, decentralized cryptocurrency system and system with segregated secure functions and public functions
US10445643B2 (en)2017-02-032019-10-15Milestone Entertainment LlcArchitectures, systems and methods for program defined state system
US10749669B2 (en)2017-02-172020-08-18Alibaba Group Holding LimitedBlockchain system and data storage method and apparatus
US20180240165A1 (en)2017-02-222018-08-23Red Hat, Inc.Blockchain-based software instance usage determination
US20180293583A1 (en)2017-04-052018-10-11Samsung Sds Co., Ltd.Method for calculating confirmation reliability for blockchain based transaction and blockchain network monitoring system for performing the method
US10885523B1 (en)2017-04-062021-01-05Amino Payments, Inc.Methods, systems, and media for protecting transactions with secure payment authorization channels
US20180294967A1 (en)2017-04-072018-10-11Citizen HexTechniques for increasing the probability that a transaction will be included in a target block of a blockchain
US10762506B1 (en)2017-05-112020-09-01United Services Automobile AssociationToken device for distributed ledger based interchange
US10616324B1 (en)2017-07-202020-04-07Architecture Technology CorporationDecentralized ledger system and method for enterprises
US10762478B1 (en)2017-08-042020-09-01Wells Fargo Bank, N.A.Creating and managing private electronic currency
US20190296915A1 (en)2017-08-052019-09-26Proclus Technologies LimitedMethod and System for Implementing Automatic Transaction Rebroadcasting for Transient Blockchains
US20190057454A1 (en)2017-08-182019-02-21United Parcel Service Of America, Inc.Immutable electronic platform for insurance selection
US20190114706A1 (en)2017-10-172019-04-18SALT Lending Holdings, Inc.Blockchain oracle for managing loans collateralized by digital assets
US20190132350A1 (en)2017-10-302019-05-02Pricewaterhousecoopers LlpSystem and method for validation of distributed data storage systems
US20190147431A1 (en)2017-11-162019-05-16Blockmason Inc.Credit Protocol
US20190173872A1 (en)2017-12-042019-06-06Mastercard International IncorporatedMethod and system for trustworthiness using digital certificates
US20190236298A1 (en)2018-01-292019-08-01Vinay Kumar AgarwalProof-of-approval distributed ledger
US20190238525A1 (en)*2018-01-312019-08-01Salesforce.Com, Inc.Systems, methods, and apparatuses for implementing super community and community sidechains with consent management for distributed ledger technologies in a cloud based computing environment
US20200374113A1 (en)2018-02-092020-11-26Orbs Ltd.Decentralized application platform for private key management
US20190251199A1 (en)*2018-02-142019-08-15Ivan KlianevTransactions Across Blockchain Networks
US10789244B1 (en)2018-02-142020-09-29Alibaba Group Holding LimitedAsset management system, method, apparatus, and electronic device
US20190334726A1 (en)2018-04-302019-10-31Dell Products L.P.Blockchain-based method and system for immutable resource allocation in a cloud computing environment
US10833865B2 (en)2018-04-302020-11-10Dell Products L.P.Blockchain-based method and system for immutable resource allocation in a cloud computing environment
US11475419B2 (en)*2018-04-302022-10-18Robert Dale BeadlesUniversal subscription and cryptocurrency payment management platforms and methods of use
US20190347656A1 (en)2018-05-102019-11-14Alibaba Group Holding LimitedBlockchain member management data processing methods, apparatuses, servers, and systems
US10380685B1 (en)2018-05-182019-08-13Capital One Services, LlcSecure system
US20200004846A1 (en)2018-06-282020-01-02International Business Machines CorporationDelegating credentials with a blockchain member service
US20200051068A1 (en)2018-07-032020-02-13Radpay, Inc.Dynamic provisioning of wallets in a secure payment system
US20200014529A1 (en)2018-07-092020-01-09At&T Intellectual Property I, L.P.Location-Based Blockchain
US11310052B1 (en)*2018-07-312022-04-19Block, Inc.Identity authentication blockchain
US20220122062A1 (en)2018-08-012022-04-21Jonathan MayblumSystems and methods for facilitating transactions using a digital currency
US20190392439A1 (en)2018-09-062019-12-26Intercontinental Exchange Holdings, Inc.Multi-signature verification network
US20200117730A1 (en)2018-10-162020-04-16Microsoft Technology Licensing, LlcDatabase management
US10839320B2 (en)2018-12-182020-11-17Rokfin, Inc.Determining network-effects with decentralized applications
US11244313B2 (en)2019-01-312022-02-08Salesforce.Com, Inc.Systems, methods, and apparatuses for implementing declarative smart actions for coins and assets transacted onto a blockchain using distributed ledger technology (DLT)
US20230245117A1 (en)*2019-02-082023-08-03Nicholas David BeaugeardDistributed Ledger Computing Platforms and Associated Methods, Systems and Devices
US20200294033A1 (en)2019-03-152020-09-17BitScan Pty LtdAutomatically assigning cryptographic tokens to cryptocurrency wallet addresses via a smart contract in response to analysis of transaction data
US10600050B1 (en)2019-03-222020-03-24Onli, Inc.Secure custody of a ledger token and/or a quantity of cryptocurrency of a distributed ledger network through binding to a possession token
US10939405B1 (en)2019-04-082021-03-02Helium Systems, Inc.Systems and methods for implementing permissionless network consensus using blockchain
US10693872B1 (en)2019-05-172020-06-23Q5ID, Inc.Identity verification system
US10698728B1 (en)2019-11-152020-06-30Blockstack PbcSystems and methods for forming application-specific blockchains
US20220318788A1 (en)2021-03-312022-10-06Paypal, Inc.Using an internal ledger with blockchain transactions
US20230177167A1 (en)2021-12-082023-06-08Paypal, Inc.Automatic verification of decentrailized protocols
US20230334492A1 (en)*2022-04-152023-10-19Block, Inc.Blockchain agnostic token network
US11888730B1 (en)2022-09-202024-01-30Block, Inc.Dynamically optimizing routing within a decentralized network

Non-Patent Citations (15)

* Cited by examiner, † Cited by third party
Title
"Encryption Software Protects Online Transactions," Security 36.9: 101-102, BNP Media, Proquest Doc. ID: 197766514, Accession ? No. 01897525, Sep. 1999.
"E-Payments: Use Blockchain Technology to Rout Risk out of Network Transactions," Publication Info: Electronics for You; Proquest Id: 1873448542, New Delhi Mar. 1, 2017.
"Mastercard Could Allow Bitcoin Transactions on Credit Cards," Proquest ID:2071401006, Publication Info: Telegraph.co.uk, London, Jul. 18, 2018.
A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks, IEEE (Year: 2018).*
Adiseshu Hari, "The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet," Nokai Z Labs, USA, HotNets-XV, Nov. 9, 2016, Atlanta, GA, USA, ISBN 978-1-4503-4661-0/16/11, (Year: 2016).
Ben Cresitello-Dittmar, "Application of the Blockchain for Authentication and Verification of Identity," (Year: 2016).
Bock, Georges, "How Blockchain Could Help Fight-or Even End-VAT Fraud," Mondaq Business Briefing, Dialog Accession No. 507029332, Sep. 28, 2017.
European Official Action dated Oct. 5, 2021 of counterpart European Application No. 19 195 904.8.
European Search Report dated Jan. 31, 2020, of counterpart European Application No. 19195904.8.
Han, Daojun, et al., "A Deletable and Modifable Blockchain Scheme Based on Record Verification Trees and the Mulitsignature Mechanism," Computer Modeling in Engineering & Sciences, Tech Science Press, Apr. 2, 2021.
Jiang, et al., "A Cross-Chain Solution to Integrating Multiple Blockchins for IoTData Management," School of Engineering, Xi'an Kiaotong University, Xi'an 710049, China, (Year: 2019).
Lemieux, "Trusting Records: Is Blockchain Technology the Answer?," Records Management Journal 26:2: 110-139, Emerald Group Publishing Limited, Proquest Document Id.: 1841766200, 2016.
Ojog, "The Emerging World of Decentralized Finance," Bucharest University of Economic Studies, Romania silvin.ojog@csie.ase.ro, Informatica Economica 25.4: pp. 43-52, Inforec Association, 2021.
QuickCash: Secure Transfer Payment Systems PMC (Year: 2017).*
Siau, et al., "Mobile Commerce: Promises, Challenges and Research Agenda," Journal of Database Management 12.3: 4-13, Hershey: IGI Global, Proquest Document ID: 199604785, Jul.-Sep. 2001.

Also Published As

Publication numberPublication date
US11004068B2 (en)2021-05-11
US20220284425A1 (en)2022-09-08
US10621579B2 (en)2020-04-14
US12125026B2 (en)2024-10-22
US11928673B2 (en)2024-03-12
CA3054228A1 (en)2020-03-06
US20200387898A1 (en)2020-12-10
EP3621015C0 (en)2025-07-16
US20250265580A1 (en)2025-08-21
US11386423B2 (en)2022-07-12
EP3621015A1 (en)2020-03-11
US20210374733A1 (en)2021-12-02
US20240428234A1 (en)2024-12-26
US10922685B2 (en)2021-02-16
US20230196348A1 (en)2023-06-22
US20210224798A1 (en)2021-07-22
EP3621015B1 (en)2025-07-16
US20190392439A1 (en)2019-12-26
US20240242208A1 (en)2024-07-18
US20200202346A1 (en)2020-06-25
US11120435B2 (en)2021-09-14
US11615408B2 (en)2023-03-28

Similar Documents

PublicationPublication DateTitle
US12327242B2 (en)Multi-signature verification network
US12277556B2 (en)Secure account creation
US20240202702A1 (en)Systems and methods for digital account activation
US20180053189A1 (en)Systems and methods for enhanced authorization response
US20160162889A1 (en)Provisioning payment credentials to a consumer
US20170178137A1 (en)Parameter-mapped one-time passwords (otp) for authentication and authorization
US20180225656A1 (en)Transmitting sensitive data from a digital wallet on a user device to a designated server for use by a transaction card application process
US20230360041A1 (en)System and method for facilitating transfer of electronic payment information
US10755264B2 (en)Methods and systems for secure online payment
KR20170085059A (en)System and method for secure account transfer
WO2022047582A1 (en)Blockchain-based technologies for secure offline transaction processing
US20200241923A1 (en)Resource instrument for processing a real-time resource event
US20190279196A1 (en)Systems and methods for digitizing payment card accounts
US20190043037A1 (en)System and method for providing secured services
US11164162B2 (en)Closed-loop real-time resource event processing

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTERCONTINENTAL EXCHANGE HOLDINGS, INC., GEORGIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PERULLO, JERRY;REEL/FRAME:068540/0797

Effective date:20190904

FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STCFInformation on status: patent grant

Free format text:PATENTED CASE


[8]ページ先頭

©2009-2025 Movatter.jp